Unit 2 Assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

D. HyperText Transfer Protocol (HTTP)

This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection. Device A is attempting to send data over the Internet to Device E. Which of the following is true of how the data will travel through the network? a. The data will always travel through Device B as it is the shortest path b. The data will never be sent to Device G since there are other shorter paths available c. It is possible that the data travels through any of the devices in the network before arriving at device E d. If the data travels through Device D then it will not travel through Device B

Answer: c. It is possible that the data travels through any of the devices in the network before arriving at device E A- It can travel through D or C incase B doesnt work B- If certain paths are closed, it is possible to go through Device G to reach E. D- Just incorrect, D is next to Device B so it can travel to Device B

Which of the following situations is most likely to cause issues arising from the digital divide? A. A state makes voter registration forms available only by visiting a government website B. Two internet-connected devices located in different countries and thousands of miles apart attempt to communicate with one another C. Packets sent from one router to another begin arriving in a different order than they were sent D. A smartphone attempts to communicate over the Internet with another type of device, like a tablet or laptop

A. A state makes voter registration forms available only by visiting a government website

Which of the following best describes the purpose of an IP address? A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet B. IP addresses assist in the reconstruction of a message that has been divided into many packets C. IP addresses indicate the location where an internet-connected computing device was manufactured D. IP addresses indicate how many times an individual packet has been requested by a router

A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

A. Transmission Control Protocol (TCP)

Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal. This situation best exemplifies which principle? A. fault-tolerance B. scalability C. protocol D. pathing

A. fault-tolerance

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible? A. Both devices are using the same shared and open protocols B. A single direct connection is established between any two devices connected to the Internet C. The data of the image is routed through a sequence of directly connected devices before arriving at its destination. D. Both devices are directly connected to at least one part of the Internet

B. A single direct connection is established between any two devices connected to the Internet

Which of the following is true of how packets are sent through the Internet? A. Packet metadata is only included on important packets to indicate they should get access to faster paths through the network B. Packet metadata is used to route and reassemble information travelling through the Internet C. Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream D. Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata

B. Packet metadata is used to route and reassemble information travelling through the Internet

Which of the following is MOST likely to be an outcome of the digital divide? A. Certain companies will be unable to certify their technology as digitally secure. B. People from some racial or ethnic groups have unequal access to computing technology. C. People will have equal access and influence both globally and locally. D. Political groups in some countries are unable to agree on regulations of digital technology.

B. People from some racial or ethnic groups have unequal access to computing technology.

This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection. What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A, from connecting with Computing Device E. (basic idea of the graph: A -> C, B, D D -> B, E, G B -> A, D, E, C C -> A, B, F F -> C, E E -> D, B, F, G G -> D, E A, all the way to left, next row is D B C, next row, E and F, last row, G A. 1 B. 2 C. 3 D. 4

C. 3 Block out C, B, and D

An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access the Internet. An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so? A. It costs less to design a network that is redundant B. The protocols of the Internet only work on networks that are redundant C. Redundant networks are more reliable D. Adding additional connections reduces the fault-tolerance of the network

C. Redundant networks are more reliable

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? A. The Internet protocols are changed every year to adapt to the new devices that have been connected to the network B. While the number of devices connected to the Internet has grown, the network itself has not grown C. The protocols of the Internet were designed to scale as new devices are added D. The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network

C. The protocols of the Internet were designed to scale as new devices are added

Match the following terms with their definitions

Computing Device - a machine that can run a program Computing System - a group of computers working together for a common purpose Computing Network - a group of connected computers that can send or receive data Path - a sequence of direct connections

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer? A. The packets will always be received in the order that they were sent B. Either every packet will reach her computer or none of them will. C. Packets that arrive out of order will be sent back to the server. D. The packets may arrive out of order

D. The packets may arrive out of order

Which of the following best describes the protocols used on the Internet? A. The protocols of the Internet are designed by government agencies to ensure they remain free to use B. The protocols of the Internet are secret to maintain the privacy and security of people using them C. Each device connected to the Internet will use a protocol designed by the company that manufactured it D. The protocols of the Internet are open and used by all devices connected to the network

D. The protocols of the Internet are open and used by all devices connected to the network


Ensembles d'études connexes

[CHAPTER 7] Inventory Management and Service Levels

View Set

Business and Society: Chapter 18

View Set

Chapter 2 Government, Law, and Ethics

View Set